List of Tables


Chapter 1: UNIX Operating System: Mind the Gap

Table 1-1: Some events in the history of UNIX
Table 1-2: Examples of UNIX flavors
Table 1-3: Characteristics of UNIX
Table 1-4: History of Solaris releases
Table 1-5: Command prompts displayed by different shells for an ordinary user and a superuser

Chapter 2: Installing Solaris 10 Software

Table 2-1: Hardware requirements for Solaris 10 installation
Table 2-2: Different installation methods
Table 2-3: Different display options
Table 2-4: Disk space requirements for installing different Solaris software groups
Table 2-5: The required installation media and software
Table 2-6: Some commands for package management

Chapter 3: Performing System Boot and Shutdown

Table 3-1: Commonly used OpenBoot PROM commands (do not type ok; it's a command prompt)
Table 3-2: Emergency commands from keyboard (<key1>-<key2> means hold down both keys at the same time)
Table 3-3: Solaris run levels
Table 3-4: Different ways of shutting down a system under different situations
Table 3-5: Prompts for different run levels
Table 3-6: Different commands for shutting down the system under different situations
Table 3-7: Different methods for booting under different situations
Table 3-8: A list of NVRAM parameters, also called openboot configuration variables
Table 3-9: Commands to view and change the values of the NVRAM parameters
Table 3-10: Relationship between the init run levels and the SMF milestones

Chapter 4: Managing File Systems

Table 4-1: Number of bytes per inode with varying disk size
Table 4-2: Comparison of hard and soft links
Table 4-3: Default file systems created during Solaris installation
Table 4-4: Possible values of a file system state flag

Chapter 5: Managing Disks

Table 5-1: Device interface types required by some commonly used commands
Table 5-2: Differences between the disk slices on SPARC and x86 systems
Table 5-3: File systems on disk slices
Table 5-4: Main tasks that you can perform by using the format utility
Table 5-5: Commands that generate the output that includes a list of devices
Table 5-6: Commands for mounting and unmounting file systems
Table 5-7: Operands to be used with the -o option of the mount command
Table 5-8: Accessing data on removable media managed by volume management

Chapter 6: Performing User Administration

Table 6-1: Components of a user account explained
Table 6-2: Integers used to specify user ID
Table 6-3: Fields of an entry in the passwd file
Table 6-4: Fields in the /etc/shadow file entries
Table 6-5: Fields in the /etc/group file
Table 6-6: Default values for some options in the useradd command (you can change these default values by using the -D option with the useradd command)
Table 6-7: User initialization files for the Bourne, C, and Korn shells (the files are copied into the user's home directory at the time the account is created)
Table 6-8: Default user initialization files for the Bourne, C, and Korn shells (copied to the user's home directory when you create a user account)
Table 6-9: Order in which the initialization files are executed for C shell, Bourne shell, and Korn shell when a user logs in

Chapter 7: Performing Security Administration

Table 7-1: Parameters in the file /etc/default/passwd
Table 7-2: Commands related to file security
Table 7-3: File types displayed by the ls command
Table 7-4: The permission symbols displayed by the ls command
Table 7-5: Symbolic mode options for the chmod command (the + means the permission is added, = means the permission is assigned, and - means the permission is taken away)
Table 7-6: Examples for octal permissions using the absolute mode options for the chmod command

Chapter 8: Managing Network Printers and System Processes

Table 8-1: Some commands to manage processes
Table 8-2: Summary of fields in the output of the ps command
Table 8-3: Summary of process states
Table 8-4: A list of process properties that appear as options in various process management command
Table 8-5: Most common signals used for controlling processes
Table 8-6: Acceptable range of values for the crontab time fields
Table 8-7: Access to the crontab command managed by the cron.allow and cron.deny files
Table 8-8: Values for the <userList> in the allow or deny files
Table 8-9: The allow and deny access rules

Chapter 9: Performing System Backups and Restores

Table 9-1: Some standard file systems to back up
Table 9-2: Comparison of various backup types
Table 9-3: Typical tape devices used for backup
Table 9-4: Examples of incremental and differential backups
Table 9-5: Options for the cpio command
Table 9-6: Options for the pax command
Table 9-7: Comparison of cpio, pax, and tar commands
Table 9-8: Comparison of various backup commands
Table 9-9: Commands available for using the ufsrestore command in interactive mode

Chapter 10: Working with the Solaris Network Environment

Table 10-1: Reserved ports for well-known applications
Table 10-2: Summary of layers of protocols in the OSI and Internet layering models
Table 10-3: Variations of Ethernet networks
Table 10-4: Class structure of IP addresses
Table 10-5: Network address ranges for different classes
Table 10-6: Incomplete list of services converted to use SMF

Chapter 11: Managing Naming Services

Table 11-1: Comparison of various naming services
Table 11-2: Database sources supported by the switch file
Table 11-3: The default NIS files (the <key> in the file extension by<key> specifies the key in the file)
Table 11-4: The NIS daemons
Table 11-5: NIS utilities
Table 11-6: The configuration directives in the resolv.conf file

Chapter 12: Managing Virtual File Systems and Core Dumps

Table 12-1: General guidelines for setting up the swap space on your system as a function of physical memory space
Table 12-2: Daemons automatically started in NFS version 4 when the system boots
Table 12-3: Files related to the NFS service
Table 12-4: Common NFS errors and possible solutions
Table 12-5: Patterns that can be used to configure the core file paths

Chapter 13: Managing Storage Volumes

Table 13-1: Comparison of mirrored and duplexed disk systems
Table 13-2: Performance improvement and fault tolerance provided by various RAID levels
Table 13-3: Read policies for RAID I volumes

Chapter 14: Managing Access Control and System Messaging

Table 14-1: Comparison of superuser and RBACK models (RBAC provides more options and flexibility)
Table 14-2: Fields in an entry of the /etc/security/auth_attr database
Table 14-3: Fields in an entry of the /etc/security/exec_attr database
Table 14-4: Files for RBAC databases
Table 14-5: Commands for RBAC management
Table 14-6: The most common error condition sources, called source facilities
Table 14-7: The most common priority levels for syslog messages

Chapter 15: Performing Advanced Installation

Table 15-1: Fields in an entry of the rules file
Table 15-2: Different subcommands that can be used with the flar command
Table 15-3: Characteristics of global and non-global zones compared
Table 15-4: Subcommands that can be used during an interactive session with the zonecfg utility
Table 15-5: Subcommands with the zoneadm command to perform various tasks (commands are issued from the global zone)




Sun Certified System Administrator for Solaris 10 Study Guide Exams 310-XXX & 310-XXX
Sun Certified System Administrator for Solaris 10 Study Guide Exams 310-XXX & 310-XXX
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net